Disclaimer: The purpose of these questions is to review the content of todays lecture. The questions have been posted by students from the course and are not entirely reviewed.
Responsible for today's questions are:
Team Number | Student Names |
Team 13 | Boris Biehl, Helene Heinle, Nils Hoffmann |
Team 14 | Stefan Kramkowski, Christian Mueller, Maria-RosarioMolina |
Team 15 | Karoline Senfft-von-Pilsach, Sebastian Wilhelm, Maik Pioch |
Question 1: 3.7 Creating intelligent interactive Documents
RichText
An embedded view is an object used to navigate
A) between documents.
B) within a folder.
C) between folders.
D) within a document.
Question 2: 3.8 Creating intelligent interactive Documents
RichText
Please check correct statements about Embedded Views
A) An embedded view can show a subset of all documents in the view that match a certain criteria.
B) Embedded views in documents have to be updated manually by a documents editor if the displayed documents do not match the criteria any more.
C) Embedded view cannot be embedded in RichText fields.
D) By double clicking a document in the Embedded View, the document will be opened.
Question 3: 3.10 Creating intelligent interactive Documents
RichText
Which of the following field types can contain file attachments?
A) Date/Time.
B) RichText.
C) RichText list.
D) Body.
Question 4: 3.11 Creating intelligent interactive Documents
RichText
Which of the following geometric forms are available as hotspot forms within imagemaps in a Lotus Notes/Domino environment?
A) Polygon.
B) Point.
C) Cube.
D) Circle.
Question 5: 5.1 Security Architectures
Security Layer
Which of the layers in the Domino security layer model can be considered as a "hard" security feature?
A) Network.
B) View/Form Access.
C) Domino Server.
D) Database.
Question 6: 5.2 Security Architectures
Security Layer
Which of the following layers in the Domino security layer model do not exist?
A) Domino Server.
B) User authentication.
C) Section Reader.
D) Database.
Question 7: 5.3 Security Architectures
Security Layer
Which of the following layers in the Domino security layer model do not exist?
A) Domino Server.
B) User authentication.
C) Section Reader.
D) Database.
Question 8: 5.4 Security Architectures
Access Control List (ACL)
A user that has been granted "Author" access to a database can perform which of the following actions by default?
A) Create documents.
B) Modify design elements.
C) Edit documents that list him as author.
D) Read documents created by other users.
Question 9: 5.10 Security Architectures
Access Control List (ACL)
Fill in the blank in the following sentence about the ACL:
Only a person with the access level
.................................................
is allowed to make changes to the ACL.
Question 10: 5.11 Security Architectures
Security Layer
Fill in the blank in the following sentence about the Domino security layers (Funnel model):
In the Domino security layer model, the top level security layer is the
.................................................
layer. |